HackDig : Dig high-quality web security articles for hacker

Top Cybersecurity Trends for the First Half of 2017

Depending on how you look at it, security has thus far had another stellar year in terms of visibility across industry and society, criticality to business, and busyness for IT and security professionals. Still, we’re constantly behind the eight ball when it comes to visibility and control, the two pillars of security that no one seems to have mastere
Publish At:2017-07-17 19:15 | Read:2814 | Comments:0 | Tags:CISO Best Practices Cybersecurity Machine Learning Malware S

Is Blockchain the Key to Stopping Ransomware Attacks?

We all remember the devastating WannaCry ransomware attack that struck organizations around the world in May 2017. The attack spread at a rate of almost 3,600 computers per hour, or about one per second. When all was said and done, the ransomware infected more than 300,000 devices. Many victims simply paid the ransom to retrieve their locked files. This only
Publish At:2017-07-13 23:10 | Read:2744 | Comments:0 | Tags:Fraud Protection Best Practices Bitcoin Blockchain Cryptocur

Nine Security Practices That May Not Be Effective

We recently looked at nine security tips that go outside the box of conventional thinking. Along with thinking about security practices creatively, however, we need to be aware of the shortcomings that come with standard defensive and protective measures. InfoWorld recently published a report, titled “18 Surprising Tips for Security Pros,” that l
Publish At:2017-03-09 17:45 | Read:2455 | Comments:0 | Tags:CISO Data Protection Best Practices Education Security Aware

Nine Security Tips That Go Outside the Box

The great challenge of security is that you are not only battling Murphy’s Law — the universal tendency of things to go wrong — but also shrewd and malicious attackers who are looking for an edge. Rather than constantly changing strategies to match these evolving threats, many security pros could benefit from finding a few simple methods that can stand
Publish At:2017-03-08 04:55 | Read:2413 | Comments:0 | Tags:CISO Best Practices Cybersecurity Data Protection Network Se

Perspectives on Securing Mobile and Social Business, 12 Months On

Twelve months ago, we reflected on two of the fastest-growing trends in enterprise operations — mobile and social business computing — and the security concerns associated with each. These technologies seem to be at odds with the traditional security concerns of the enterprise. Today, there is a business desire to increase access to relevant corporate inform
Publish At:2017-01-23 21:30 | Read:4139 | Comments:0 | Tags:Mobile Security Best Practices Cognitive Computing Cognitive

The Holes in Your Knows

I have some, you have some — we all have some holes in our knows. As security professionals, we are often reluctant to admit it. The Dunning-Kruger effect states that the less you know about a subject, the more you are unaware of your lack of knowledge. But by the time we gain expert security knowledge, we are more aware of the unknowns. Filling the Holes in
Publish At:2017-01-16 23:40 | Read:3798 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Best Pra

Hacked for the Holidays: When You’re Asked to Fix the Family Computer

Whether hanging stockings, lighting candles on a menorah or gathering for an Airing of Grievances, if you are an IT professional visiting family this season, you will inevitably be asked to fix the family computer, tablet, smartphone or programmable thermostat while you’re there. As an introvert, I use the hour I might have to spend uninstalling browse
Publish At:2016-12-19 22:55 | Read:2890 | Comments:0 | Tags:X-Force Research Best Practices Cybersecurity Password Passw

IDG Contributor Network: Beyond Acronyms: Humanizing Big Data and Information Governance through Mindful Storytelling

“Data governance applies to everything that we do,” shared Janice Haith, Department of Navy’s Deputy CIO. And, being responsible for complex, mission-critical initiatives such as enterprise architecture, software licensing, information assurance, data and help desk consolidation, and compliance, to name a few – means there is a lot of data to be dealt wi
Publish At:2016-06-23 23:00 | Read:2942 | Comments:0 | Tags:Big Data Data Center Hardware Security Storage Enterprise Ar

IDG Contributor Network: Privacy policy or privacy notice: what's the difference?

Often I am asked the difference between a privacy policy and privacy notice. Some of the confusion comes from a company’s description of their privacy practices on their website being called a privacy policy. Some people ask, “Isn’t the information on the website enough?” Let’s clear up the confusion and answer the question.Defining a privacy policy and
Publish At:2016-05-04 17:35 | Read:3050 | Comments:0 | Tags:Privacy Security Best Practices Data Protection Compliance R

IDG Contributor Network: Phishing for W-2s

It’s late in the day on a Friday and an email just landed in your payroll administrator’s inbox. “I want you to send me a digital copy of the W-2s for our employees in one PDF folder asap.” The email was sent by the president of your company.Sound far-fetched? A number of companies have fallen for this phishing scam already over 40 of which are named by
Publish At:2016-03-28 20:11 | Read:3396 | Comments:0 | Tags:Privacy Security Data Protection Best Practices

Seven Best Practices to Winterize Your Cybersecurity for 2016

In some parts of the world, the new year comes in with the onset of winter, which means it’s time to winterize our cars, our houses and ourselves. The new year is also a good time to winterize your organization’s cybersecurity by adopting some best practices that will get you safely through the snowdrifts and across the patches of black ice on th
Publish At:2015-12-29 14:05 | Read:3111 | Comments:0 | Tags:CISO Risk Management Best Practices Cybersecurity Security I

Waiting Until the Last Minute to Implement Long-Term Security Measures

We live in a gotta-have-it-now society. The desire for instant gratification is not only at the root of personal desires, but it also drives bigger, more impactful things in business and government. Quick fixes to problems that arise, often with little to no thought put behind them, are implemented and often politicized for the gain of an individual or group
Publish At:2015-12-16 18:40 | Read:1801 | Comments:0 | Tags:Risk Management Best Practices Information Security Security

Britain’s GCHQ Wants to Help You Improve Your Password Strength

We all use too many passwords, and many of us reuse the same password on numerous sites, which is bad for both individual and corporate security. While many IT managers have tried to fix this over the years, the situation is only getting worse as more cloud-based logins are used, making more passwords necessary. Users need ways to improve password strength a
Publish At:2015-10-29 15:15 | Read:2836 | Comments:0 | Tags:Application Security Best Practices Cybersecurity Password P

A Security Protocol for the Internet of Things

The Internet of Things (IoT) is growing by leaps and bounds every day. But as the IoT grows, so do the security vulnerabilities of the linked objects. A security protocol to protect IoT devices will always be needed. For example, an appliance manufacturer may want to link its air conditioning systems to smart home networks to increase sales, but it has never
Publish At:2015-10-27 09:15 | Read:2916 | Comments:0 | Tags:Cloud Security Best Practices Cybersecurity Internet of Thin

Making Security Best Practices More Viable

When it comes to security best practices, there is an ocean of difference between the security expert and the common user — at least according to a recent survey that compared several hundred people from the two populations. The study, “‘…no one can hack my mind’: Comparing Expert and Non-Expert Security Practices,” was based on
Publish At:2015-10-20 15:15 | Read:2873 | Comments:0 | Tags:Application Security Best Practices Google Multifactor Authe


Share high-quality web security related articles with you:)


Tag Cloud